redtimmy / golden-frieza
ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory
☆26Updated 4 years ago
Alternatives and similar repositories for golden-frieza:
Users that are interested in golden-frieza are comparing it to the libraries listed below
- ☆49Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- A repository for my conference presentations☆35Updated 4 years ago
- ☆27Updated 5 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- ☆16Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆39Updated 6 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆67Updated 5 years ago
- ☆20Updated 5 years ago
- ☆36Updated 6 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆67Updated 4 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆71Updated 3 years ago
- ☆48Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆69Updated 3 years ago
- Matryoshka - stacked LKM loader☆50Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- Crystal Anti-Exploit Protection 2012☆35Updated 4 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆14Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- ☆134Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago